Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 53

Full-Text Articles in Physical Sciences and Mathematics

User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light Jan 2019

User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light

Walden Dissertations and Doctoral Studies

Although in the past 50 years significant advances based on research of brain-computer interface (BCI) technology have occurred, there is a scarcity of BCI assistive technology devices at the consumer level. This multiple case study explored user-centered clinical BCI device design strategies used by computer scientists designing BCI assistive technologies to meet patient-centered outcomes. The population for the study encompassed computer scientists experienced with clinical BCI assistive technology design located in the midwestern, northeastern, and southern regions of the United States, as well as western Europe. The multi-motive information systems continuance model was the conceptual framework for the study. Interview …


Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez Jan 2019

Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez

Walden Dissertations and Doctoral Studies

The absence of legislation, the lack of a standard cybersecurity framework, and the failure to adopt a resilient cybersecurity posture can be detrimental to the availability, confidentiality, and integrity of municipal information systems. The purpose of this phenomenological study was to understand the cybersecurity posture of municipalities from the perception of public servants serving in information technology (IT) leadership roles in highly populated municipalities in the San Juan-Carolina-Caguas Metropolitan Statistical Area of Puerto Rico. The study was also used to address key factors influencing the cybersecurity posture of these municipalities. The theoretical framework was open system theory used in combination …


Successful Strategies For Using Knowledge Management In Small And Medium-Sized Enterprises, Josephine Kayaga Nsubuga-Mugoa Jan 2019

Successful Strategies For Using Knowledge Management In Small And Medium-Sized Enterprises, Josephine Kayaga Nsubuga-Mugoa

Walden Dissertations and Doctoral Studies

Knowledge management (KM) is vital for an organization to succeed in a highly dynamic and competitive world. The purpose of this multiple case study was to explore strategies that managers of small and medium-sized enterprises (SMEs) use to effectively integrate KM into business practices. The study population comprised 5 managers from 2 SMEs operating in Uganda. The eligibility criteria for this study were that participants had to be from Ugandan SMEs with a knowledge-intensive environment, managers with some responsibility of KM in the organization, and experienced with at least 1 year of successful KM practices. The conceptual framework for this …


Factors That Predict The Adoption Of Online Shopping In Saudi Arabia, Momen Nachar Jan 2019

Factors That Predict The Adoption Of Online Shopping In Saudi Arabia, Momen Nachar

Walden Dissertations and Doctoral Studies

Despite the increased numbers of online consumers, e-commerce growth is slow in the Kingdom of Saudi Arabia. In this correlational study, the technology acceptance model (TAM) was used as a theoretical framework to examine whether perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms could predict consumers' intention to adopt shopping online. A pre-existing TAM survey instrument was used to collect data from consumers (N = 95) who live in a City and have shopped at least once online. The regression analysis confirmed a positive statistically significant relationship between perceived ease of use of e-commerce platforms …


Strategies To Recruit Skilled Workers In Manufacturing, Ina Renee Rawlinson Jan 2019

Strategies To Recruit Skilled Workers In Manufacturing, Ina Renee Rawlinson

Walden Dissertations and Doctoral Studies

Manufacturing hiring managers in the United States who fail to implement adequate recruitment strategies for skilled production workers experience reduced profits and sustainability challenges. The purpose of this multiple case study was to explore the strategies that successful manufacturing hiring managers in North Carolina used to recruit skilled production workers to sustain business profitability. Inductive analysis was guided by the human capital theory, and trustworthiness of interpretations was strengthened by member checking. The population for the study consisted of 4 business leaders who demonstrated the use of effective recruitment strategies to sustain profitability in manufacturing businesses in southeastern North Carolina. …


Innovation Strategies In Small Agrarian Businesses In Sierra Leone, Solomon Sorba Scholz Jan 2019

Innovation Strategies In Small Agrarian Businesses In Sierra Leone, Solomon Sorba Scholz

Walden Dissertations and Doctoral Studies

In 2015, a sharp decline in the sustainability of small agrarian businesses in Sierra Leone resulted in the gross domestic product declining by 41%. The purpose of this multiple case study was to explore the innovation strategies owners of small agrarian businesses use to sustain their businesses for longer than 5 years. The disruptive innovation theory was the conceptual framework for this study. The participants were 16 owners of small agrarian businesses from Makeni, Kenema, Bo, and Freetown districts in Sierra Leone who have sustained their businesses for longer than 5 years. Data were collected using semistructured interviews, personal notes, …


Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr Jan 2019

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta Jan 2019

Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta

Walden Dissertations and Doctoral Studies

Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. …


Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud Jan 2019

Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud

Walden Dissertations and Doctoral Studies

The adoption rate of cloud computing is low among business organizations in Saudi Arabia, despite the cost-€saving benefits of using cloud services. The purpose of this multiple case study was to explore the strategies that information technology (IT) leaders in the manufacturing industry in Saudi Arabia used to adopt cloud computing to reduce IT costs. The target population of this study consisted of 5 IT leaders from 5 different manufacturing companies in Saudi Arabia who successfully adopted cloud computing in their companies to reduce IT costs. Rogers's diffusion of innovation theory was the conceptual framework for this research. Data collected …


Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani Jan 2019

Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani

Walden Dissertations and Doctoral Studies

Effective communication among team members in software development projects is increasingly significant for the success of the project. Successful software projects are the catalyst for achieving profitability objectives and creating shareholder value in organizations. The purpose of this single case study was to investigate communication strategies information technology (IT) project managers used for successful team collaboration in software development. The population for this study comprised senior IT project managers. The project managers had supervision responsibilities from a midsized IT company in Alberta, Canada. The sociotechnical theory guided this study as the conceptual framework. Data were collected from semistructured interviews with …


Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood Jan 2019

Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood

Walden Dissertations and Doctoral Studies

Cloud computing innovation adoption literature has primarily focused on individuals, small businesses, and nonprofit organizations. The functional linkage between cloud adoption and diffusion is instrumental toward understanding enterprise firm-level adoption. The purpose of this qualitative collective case study was to explore strategies used by information technology (IT) executives to make advantageous enterprise cloud adoption and diffusion decisions. This study was guided by an integrated diffusion of innovation and technology, organization, and environment conceptual framework to capture and model this complex, multifaceted problem. The study’s population consisted of IT executives with cloud-centric roles in 3 large (revenues greater than $5 billion) …


Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson Jan 2019

Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson

Walden Dissertations and Doctoral Studies

Humans are the weakest link in any information security (IS) environment. Research has shown that humans account for more than half of all security incidents in organizations. The purpose of this qualitative case study was to explore the strategies IS managers use to provide training and awareness programs that improve compliance with organizational security policies and reduce the number of security incidents. The population for this study was IS security managers from 2 organizations in Western New York. Information theory and institutional isomorphism were the conceptual frameworks for this study. Data collection was performed using face-to-face interviews with IS managers …


Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr Jan 2019

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr

Walden Dissertations and Doctoral Studies

Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were …


Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson Jan 2019

Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson

Walden Dissertations and Doctoral Studies

Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow Jan 2019

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith Jan 2019

Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith

Walden Dissertations and Doctoral Studies

A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone …


Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell Jan 2019

Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell

Walden Dissertations and Doctoral Studies

The low retention rate of information technology (IT) project managers from a region in the southeastern United States has increased an organization's operational costs and decreased the organization's global competitiveness. The conceptual foundation for this study was the resource-based theory of competitive advantage. This multiple case study explored IT project managers' perceptions of the factors that contributed to their retention. Participants in the study included 10 IT project managers with at least 5 years of experience who were also members of a chapter of the Project Management Institute (PMI). Semistructured interviews were conducted via teleconference to collect data that were …


Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson Jan 2019

Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson

Walden Dissertations and Doctoral Studies

Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation …


Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens Jan 2019

Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens

Walden Dissertations and Doctoral Studies

The intention of implementing technology into healthcare practices is to reduce opportunity for errors in the delivery of providing health care. However, errors still occur, and many times are preventable. Configurations of health information technology systems should match clinical workflows to promote usage as intended. The purpose of this quality improvement project was to evaluate the impact of revised system configurations and use of a blood product transfusion system for the administration of blood products after one year of implementation. The method of heuristic evaluation is a usability engineering method for finding problems in a user interface design with the …


Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding Jan 2019

Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding

Walden Dissertations and Doctoral Studies

Emergency medical technicians (EMTs) usually participate in disaster response in rural African communities. Disasters in African communities are often characterized by huge fatalities, which are associated with a slow pace of response. The use of information and communication technology in disaster response is recognized as an effective conduit for enhancing response. Previous research indicates the efficacy of the use of mobile telephones in disaster response in advance countries. However, there remains a critical gap in the available literature on the experiences of EMTs with the use of mobile telephones in disaster response in rural African communities. The purpose of this …


Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez Jan 2019

Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez

Walden Dissertations and Doctoral Studies

Student technology literacy is critical for success in today’s world; however, little is understood about how teachers make the decision for students to use technology for learning due to limited empirical research on the topic of teacher decision-making regarding student use of information communication technologies (ICT). The purpose of this generic qualitative study was to explore the decision-making process of kindergarten to Grade 5 (K-5) teachers regarding implementation of ICT for student use at varying levels. The framework for this study comprised the substitution augmentation modification redefinition model and the technology acceptance model. The research questions focused on how teachers …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki Jan 2019

Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki

Walden Dissertations and Doctoral Studies

The failure rate of new government information technology (IT) projects in developing countries is high, with 35% classified as total failures and approximately 50% as partial failures. The population for this study was 10 senior managers of a public sector organization in Uganda selected because of high IT project successes achieved through leveraging IT return on investment (ROI) reports. The purpose of this qualitative single-case study was to explore the strategies Ugandan senior public sector officials used to leverage IT ROI reports during planning, budgeting, and implementation of IT projects to reduce failure rates. The conceptual frameworks were the strategic …


Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif Jan 2019

Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif

Walden Dissertations and Doctoral Studies

Cloud computing emerged as an alternative to traditional in-house data centers that businesses can leverage to increase the operation agility and employees' productivity. IT solution architects are tasked with presenting to IT managers some analysis reflecting cloud computing adoption critical barriers and challenges. This quantitative correlational study established an enhanced technology acceptance model (TAM) with four external variables: perceived security (PeS), perceived privacy (PeP), perceived connectedness (PeN), and perceived complexity (PeC) as antecedents of perceived usefulness (PU) and perceived ease of use (PEoU) in a cloud computing context. Data collected from 125 participants, who responded to the invitation through an …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack Jan 2019

Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack

Walden Dissertations and Doctoral Studies

Many information technology (IT) outsourcing initiatives fail, resulting in a high impact on business results and customer satisfaction. Without effective strategies, business leaders who outsource their IT services are at considerable risk of failure and stakeholder dissatisfaction. The purpose of this multiple case study was to explore outsourcing strategies that IT managers in Southern Ontario, Canada, used to ensure customer satisfaction. Participants included 9 executives with experience in complex IT outsourcing initiatives. Stakeholder theory and transaction cost economics theory were the conceptual frameworks for the study. Data were gathered using semistructured interviews to query 8 topical areas including IT outsourcing …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song Jan 2019

Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song

Walden Dissertations and Doctoral Studies

Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer's health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, …